The Latest in IT Security

Posts Tagged ‘SEO’

Attackers have been using the .htaccess file for a while. They use this file to hide malware, to redirect search engines to their own sites (think blackhat SEO), and for many other purposes (hide backdoors, inject content, to modify the php.ini values, etc).Why do they use the .htaccess file? For multiple reasons. First, the .htaccess […]

Read more ...

The use of search engine optimisation (SEO) in malware distribution has been discussed many times on this blog. In most cases, the attacks are used to redirect unsuspecting users to scareware (fake anti-virus) sites, where they are tricked into installing fake AV. The attacks have historically been Windows-specific, but recently we have seen the attackers […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments